01
Personal message
Your introduction or final words. The first pane the inheritor sees, before any file or stat. The first thing they encounter is you, not a directory.
Eternal Vault
Pay once. Preserve up to 1,000 years. Dual-signed with Ed25519 and ML-DSA-65. Inheritable across generations, designed to outlast Henedo itself.
Most people think of legacy storage as a locked box for the future. The Eternal Vault is the opposite: your designated inheritors hold valid decryption keys from the day you seal it. Up to 1,000 years is a preservation guarantee, not a lock timer.
At sealing, you choose either instant access (inheritors can decrypt immediately, perfect for gifts, family records, shared photos) or dead-man-gated access (same 5-week cascade as the Living Vault).
"A folder of files for descendants" is a fair critique of any legacy product that ends at storage. The Eternal Vault Access experience is engineered the opposite way, a chronological story, not a directory listing.
01
Your introduction or final words. The first pane the inheritor sees, before any file or stat. The first thing they encounter is you, not a directory.
02
Chronological entries with native voice and video playback. Years of weekly voice notes accumulate into a 100-entry life narrative your heirs can play in order.
03
Documents organized by folder with search and per-file inheritor key unwrapping. Reachable after the human-touch panes, not before.
04
Total photos, voice minutes, video minutes, documents, so they understand the scope before they start.
05
Your spouse sees what you tagged for them; your child sees what you tagged for them. Routing is encrypted client-side; the server never knows who got what.
Each file you add to an Eternal Vault keeps the written note and the recorded voice memo you attached to it in the Living Vault. At sealing time, the note text is bound into the EVAK-encrypted manifest and the voice memo audio is re-encrypted under the same EVAK and stored as a sibling blob inside the vault. Both are covered by the SHA3-512 vault hash and the hybrid Ed25519 + ML-DSA-65 (NIST FIPS 204) signature that protects the rest of the manifest.
The result: in 80 or 200 or 500 years, when a great-grandchild opens the vault, they don't just see "Property_Deed_2026.pdf" — they see your written note explaining why the house mattered and they hear the 30-second voice memo you recorded when you scanned it. Folders carry the same payload: a "Family Photos" folder can have a recorded intro that plays before any file inside is opened. Documents become biography.
Inheritor decryption is identical to file decryption — no extra key, no second prompt. Once they unlock the vault with their card + email split, the same EVAK that decrypts every file also decrypts every note and every voice memo. The post-quantum guarantee covers them too.
A sealed Eternal Vault can be claimed by an inheritor who has their own Henedo account. They can then seal their own Eternal Vault on top of it, which their descendants can chain forward in turn.
Great-grandfather (2026) → [Financial records + letter to future family]
└── Son links his account (2058) → seals own vault, chains to father
└── Grandson links his account (2085) → seals own vault, chains to both
└── Great-granddaughter (2110) → sees the entire chainEach generation inherits not just documents but a verified, signed record of every ancestor who used the platform.
Every Eternal Vault carries:
Future verifiers need only one of the two signatures to hold. This is how you build something that lasts.
"Up to 1,000 years" is not a marketing promise, it is a five-layer engineering commitment. Each layer is independently meaningful and each closes a different failure mode.
01 — Layer
AES-256-GCM (Grover-resistant), Argon2id (hash-based, immune to Shor), ML-DSA-65 (NIST FIPS 204), SHA3-512 (post-quantum integrity hash). A future verifier with only the ciphertext, the public hash, and the spec can verify integrity without us.
02 — Layer
Each vault embeds a self-describing crypto manifest: algorithms, parameters, library versions. Decoding requires only the spec, not Henedo. The manifest is human-readable and printable.
03 — Layer
Geo-redundant primary storage across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks and a ~10-year hardware-refresh cycle that migrates drives, formats, and infrastructure to current technology — the discipline used by the Library of Congress, national archives, and other archival institutions (ISO 14721 / OAIS, PREMIS). On top of that, optional M-DISC, a rock-like inorganic optical medium tested per ISO/IEC 10995:2011/ECMA-379 and rated for up to 1,000 years (U.S. DoD projection), is the extra redundancy layer — ship it once, your heirs hold it forever.
04 — Layer
The one-time purchase is held in a capital reserve sized so storage costs decline ~50% every 5 years (Kryder/cloud-storage trends) without depleting principal. The math is published. If Henedo ever winds down, the trustee transfers the manifest log to an OAIS-conformant successor (firm to be named when contracted).
05 — Layer
The M-DISC plus the public crypto spec is preservation independent of any institution. Customers who want zero institutional trust buy the M-DISC. The portability page shows the exact decrypt-without-Henedo recipe.
Your Eternal Vault doesn't depend on Henedo being here in 2126.
The Living Vault is operated by Henedo: we run the platform, gate the access, and maintain the servers. That is fine, the Living Vault is meant to disappear after it delivers. The Eternal Vault is engineered the opposite way. With the M-DISC, the printed crypto spec, and your inheritor's key, the vault is decryptable on any computer running standard AES-256-GCM and Argon2id. No Henedo website, no Henedo servers, no Henedo employees required.
We treat this as a customer-protective design choice, not a hedge. The full recipe is on the portability page: print it, hand it to your heirs alongside the M-DISC, and the vault is theirs forever.
What actually keeps an Eternal Vault alive across a century is not any single medium — it is active preservation. The primary storage layer is geo-redundant: encrypted blobs replicated across multiple regions on a current-generation cloud object store, with continuous SHA-3 fixity checks that detect silent corruption and re-replicate automatically. Roughly every 10 years, the underlying drives, formats, and infrastructure are migrated to current technology, the way the Library of Congress, national archives, and other serious archival institutions do it (formalised by ISO 14721 / OAIS and the PREMIS preservation metadata standard). The endowment built into the one-time price funds those decade-by-decade refreshes for the full duration you bought.
Optional add-on from $59 — sits on top of the actively-preserved primary store as an extra safety layer. We burn your encrypted vault, and a printed copy of the crypto spec, to an M-DISC optical medium tested per ISO/IEC 10995:2011/ECMA-379 and rated for up to 1,000 years (U.S. Department of Defense projection), then ship it to you. Even if every cloud provider disappears, the physical disc survives, and your heirs can decrypt it with standard tools. M-DISC is a redundancy layer, never the only copy of your data.
$499 for 100 years. $4.99 per year. One sealed vault, open-standard, signed forever.